Académique Documents
Professionnel Documents
Culture Documents
and understood is called plaintext or clear text. The method of scrambling the plaintext in such a way that hides its substance is called encryption. Encrypting plaintext makes the information in unreadable information called cipher text. The process of converting cipher text to its original information is called decryption. The complexity of encryption process depends on algorithm used for encryption, software used and the key used in algorithm to encrypt or decrypt the data. Security of any encryption system depends on the security principle proposed by Kirchhoff. According to the Kirchhoff, the security of the encryption system should depend on the secrecy of the encryption /decryption key rather than encryption algorithm. [3] After extensive survey of various research papers it is observed that an encryption algorithm should produce significant change in the encrypted message when a small change is made in original message.
1. INTRODUCTION
Transmission of sensitive digital data over the communication channel has emphasized the need for fast and secure digital communication networks to achieve the requirements for integrity, secrecy and non reproduction of transmitted information. Cryptography provides a method for securing and authenticating the transmission of information across insecure communication channels. It enables us to store sensitive information or transmit it over insecure communication networks so that unauthorized persons cannot read it. [1] Cryptography is an indispensable tool for protecting sensitive information in computer systems. Cryptography makes the message unintelligible to outside the world by various transformations. Data Cryptography is method of scrambling the content of digital data like text, image, audio and video to make it unreadable or unintelligible for others during transmission. The main goal of cryptography is to keep the data secure from unauthorized access [2]. Data containing information that can be read Volume 1, Issue 3, September October 2012
In research papers [8] and [9] authors analyzed various cryptographic algorithms using a parameter called Avalanche Effect. In this paper we proposed an enhancement in DES algorithm using binary codes. This proposed algorithm is expected to provide significant high Avalanche Effect.
2. CRYPTOGRAPHIC ALGORITHMS
Depending upon the number of keys used, cryptographic algorithms can be classified as asymmetric algorithms (public key) and symmetric algorithms (secret key). In Page 166
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
Symmetric keys encryption or secret key encryption identical key is used by sender and receiver. Data Encryption Standard (DES), 3DES, and Advanced Encryption Standard (AES) are the example of Symmetric key encryption algorithms. In asymmetric keys encryption two different keys (public and private keys) are used for encryption and decryption. Public key is used for encryption and private key is used for decryption Rivest-Shamir-Adelman (RSA) and Elliptic Curve Cryptosystem (ECC) are the example of asymmetric key algorithms.[4]A symmetric cryptosystem has five ingredients: 2.1 Plaintext This is the original data or message to be transmitted that fed into the algorithm as input. 2.2 Encryption Algorithm The algorithm performs various transformations and substitutions on the plaintext. 2.3 Secret key This is another input to the algorithm and the value of secret key is independent of the plaintext. Depending on the specific key the algorithm will produce a different output. 2.4 Encryption Algorithm This is the scrambled or encrypted message produced as output. This output depends on the plaintext and the secret key.[5] 2.5 Decryption Algorithm This is essentially the encryption algorithm operate in reverse. It takes the ciphertext and the secret key as input and produces the original plaintext as output. Data can be recovered from cipher only by using exactly the same key used to encipher it. Unauthorized recipients of the cipher who know the algorithm but do not have the correct key cannot derive the original data algorithmically. However, it may be feasible to determine the key by a brute force Exhaustion attack Also, anyone who does have the key and the algorithm can easily decipher the cipher and obtain the original data. A standard algorithm based on a secure key thus provides a basis for
Figure 2 DES (Data Encryption Standard) process Input plaintext Encryption key
Binary Codes
Binary Codes
3. DES ALGORITHM
The Data Encryption Standard (DES) designed to encrypt and decrypt blocks of data consisting of 64 bits under control of a 64-bit key. Encrypting data converts it to an unreadable cryptorgaphic security of the data depends on the security provided for the key used to encipher and decipher the data. [4]form known as cipher. Decrypting cipher converts the data back to its original form known as plaintext. Both encryption and decryption operations are performed using a binary number called a key. A DES key is a 64 bit binary number of which 56 bits are randomly generated and used directly by the algorithm. The remaining 8 bits, which are not used by the algorithm while encryption, can be used for error detection. The 8 error detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e., there is an odd number of "1"s in each 8-bit byte. Authorized users of encrypted computer data must have the key that was used to encipher the data in order to decrypt it. The encryption algorithms specified in this standard are commonly known among those using the standard. The Volume 1, Issue 3, September October 2012 Encryption Algorithm (DES)
Ciphertext Figure 3 DES process when input plaintext and input key are mapped in binary code exchanging encrypted computer data by issuing the key used to encipher it to those authorized to have the data. Data that is considered sensitive by the responsible authority, data that has a high value, or data that represents a high value should be cryptographically protected if it is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. [6]
Page 167
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856 4. METHODOLOGY
We have implemented Data Encryption Standard (DES) algorithm in MATLAB 7.0 software. This encryption technique takes 64 bit data block as input and encrypt this data block using 64 bit key. Figure 3 shows the block diagram of algorithm that we have used for our experiments. In our experiments we have mapped input plaintext and encryption key into various binary codes before providing the input to the DES algorithm. If there are n quantities in a group, a code of b binary digits or bits may represent all quantities unequally. [7] b n 4.1 Natural BCD Code (8421 code) Natural BCD code or 8421 code is used whenever decimal information is transferred in or out of a digital system. In this code straight assignment of binary equivalent is used with weights. 4.2 2421 Code These are weighted ,reflected and self-complementing codes, In 2421 codes if a number has more than one representation then choose the code that uses the lower binary weights (for number 0-4 only) 4.3 5421 Code These are weighted code with weight 5-4-2-1. In 5421 codes if a number has more than one representation then choose the code that uses the lower binary weights. 4.4 7421 Code These are weighted code with weight 7-4-2-1. For decimal number 7 choose code with least number of 1s. 4.5 5311/5211 Code These are weighted code with weight 5-3-3-1. In these codes if a number has more than one representation then choose the code with least number of 1s and use first the 1 from extreme right that uses the lower binary weights. 4.6 Gray Code It is also known as reflected and unit distance code which is a reflected mirror image. Unit distance exhibit only a single bit change from one code to the next. It is also an unweighted and not an arithmetic code. 4.7 3321/4221 Code These are weighted code with weight 3-3-2-1/4-2-2-1. the plaintext or the key should produce a significant change in the cipher text.
AvalancheEffect
However, a change in one bit of the plaintext or one bit of the key should produce a change in many bits of the cipher texts. This property is known as Avalanche Effect [8, 9].Avalanche Effect can be calculated by using above equation. The performance of proposed algorithm is evaluated using Avalanche Effect due to one bit variation in plaintext(before being mapped in various binary codes) keeping encryption key constant in a binary code . Avalanche Effect is calculated for various combination of plaintext and encryption key by mapping them in various binary codes. Table 1: Data code is fixed in 2421 code and key varied
Data in 2421 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 Data:'ABCDEF01 23456789' 27456789' 'C79E3C7 '2A8EA04C A3E1763CF' 65B41C60' 'B466EBF3 '778AD655 64DB1F96' 703CF8A7' '194DBB9E 'AAADCE33 9849A99D' FE7F47B7' 06A844B0 '0CF914C3 3889B6DD' 1991F112' '19324425 'ED577EB1 F522CD27' B746B3F6' 'E9CCABBF '7FFC85C3 AB908BD4' 72360A1A' 'B009AA52 '4441B255 8D569E46' 993F9517' 'F711F8F9 '03185F61 ED42BAEB' B8746736' '9AE993DC '0C10DF1A 123AB963' A3137F98' Avalanche Effect 37 35 35 26 31 31 24 35 35
5. EVALUATON PARAMETER
Each of the encryption technique has its own strong and weak points. In order to apply an appropriate technique in a particular application we are required to know these strengths and weakness. Therefore the analysis of these techniques is critically necessary. A desirable property of any encryption algorithm is that a small change in either Volume 1, Issue 3, September October 2012
Page 168
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
Table 3 : Data code is fixed in 4221 code and key varied
Data in 4221 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 23456789' '8B5B700C 691E1058' 'A144F374 DA022507' 'B957F5F4 82D45CEF' '64A2C1D2 DE1D3305' '1F0FDC21 CDFA29C9' '9AC6B870 4A6678EC' 'F4B1C37B 50E1B589' '92931295 0EEB83BE' '1F662D0D 6B46637E' Data:'ABCDEF01 27456789' '894E1AEC BD04568D' 'D0A60E85 3F47C3B4' 'B87C3338 B128D8D5' '1EFC9935 0AAB90B8' '1A42DA38 5EE5ABA8' '54B93B6B 62F10F4C' '44C50BD7 2B691BC6' '71FF1693 EA3BC103' '2C31111E 56C69688' Avalanche Effect 26 38 29 38 25 34 32 27 34
Page 169
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
Table 9: Data code is fixed in 8421 code and key varied
Data in 8421 2421 3321 4221 5211 5311 5421 7421 GRAY 8421 Key : '3B3898371520F75E' Data:'ABCDEF01 Data:'ABCDEF01 23456789' 27456789' '51D5C358 '03241206 87F225E0' D5267CB6' '6ACE01AB 'B9F3503E 18E3BEED' 7E76ACD8' '893371A0 'F083D019 F35E9D42' 1F904366' 'E26D679B '94384BFE F2125563' 31820A7D' '30FB4B88 '80C37F91 3305A7BF' 586D4D14' 'BB0F578DE '4B2773FE ECDB8E7' 67DC2A9C' 'DE361067 '6625F098 6242E21F' 86BEA3C3' '7C19449A '9B80FD64 55C9A64B' 17BA3ECD' '7D0DFC6A '02E82396 BA2C587D' 14B9CFB1' Avalanche Effect 32 31 34 32 30 27 35 35 43
code and encryption key is varied in different binary codes. By analyzing table 10 it is clear that Avalanche Effect is maximum (i.e. 44 bits out of 64 bits) when key remain fixed in Gray code and 1 bit is varied in data when it is mapped in 3321 binary code. Figure 4 shows analysis of Avalanche Effect Due to one bit change in plaintext when encryption key is constant .it is clear from figure that maximum Avalanche Effect can be obtained when encryption key is mapped in Gray code and data is mapped in 3321 binary code. Therefore, if one desires a good avalanche effect; DES is a good option.
7. CONCLUSION
In this paper a slight modification in DES algorithm is proposed. In the proposed algorithm, we have mapped input plaintext and encryption key into various binary codes, instead of giving plaintext directly to the DES algorithm. This leads significant increase in Avalanche Effect of encryption algorithm. We got maximum avalanche effect of 44/64, when key is mapped in Gray code and Data is mapped in 5421.But due to invertible property of 5421 code some of the code may be duplicated. Therefore this mapping is not suggested as some code (duplicated code) may be decoded wrongly. Our future work will include experiments on image and focus will be to improve security level.
Table 10: Analysis of Avalanche Effect Due to one bit change in plaintext
8. ACKNOWLEDGMENT
This paper is a part of our M.E. project. We are grateful to our project guide for valuable suggestions, comments and contribution.
REFERENCES
Figure 4 Analysis of Avalanche Effect Due to one bit change in plaintext 1. P.Karthigaikumar, Soumiya RasheedSimulation of Image Encryption using AES Algorithm IJCA Special Issue on Computational Science - New Dimensions & Perspectives NCCSE, 2011 Diaa Salama Abd Elminaam, Hatem Mohamad Abdual Kader,Mohiy Mohamed Hadhoud, Evalution the Performance of Symmetric Encryption Algorithms, international journal of network security vol.10,No.3,pp,216-222,May 2010. Nidhi Singhal, J.P.S.Raina Comparative Analysis of AES and RC4 Algorithms for Better Utilization International Journal of Computer Trends and Technology- July to Aug Issue 2011. Akash Kumar Mandal, Chandra Parakash, Mrs. Archana Tiwari Performance Evaluation of Cryptographic Algorithms:DES and AES IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), March 2012 William Stalling Cryptography and network security Pearson education,2nd Edition. Page 170
2.
3.
4.
5.
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 3, September October 2012 ISSN 2278-6856
6. Data Encryption Standard Announced by the Federal Information Processing Standards Publication 46-3, 1999 October 25 A.Anand Kumar ,Fundamentals of Digital Circuits, PHI Learning Pvt.Ltd.,2nd Edition Himani Agrawal and Monisha Sharma Implementation and analysis of various symmetric cryptosystems Indian Journal of Science and Technology Vol. 3 No. 12 (Dec 2010) Sriram Ramanujam,Marimutha Karuppiah Designing an algorithm with high avalanche effect International Journal of Computer Science and Network Security, VOL.11 No.1, January 2011
7. 8.
9.
10. A.Nadeem, "A performance comparison of data encryption algorithms", IEEE information and communication technologies, pp.84-89, 2006.Bn 11. NeetuSettia.Cryptanalysis of modern Cryptography Algorithms. International Journal of Computer Science and Technology. December 2010. 12. Diaasalama, Abdul kader, Mohiy Hadhoud, Studying the Effect of Most Common Encryption Algorithms, International Arab Journal of etechnology, Vol 2, No.1, January 2011. 13. Ruangchaijatupon,P.Krishnamurthy,Encryption and power consumption in wireless LANs-n, The Third IEEE workshop on wireless LANS, pp. 148-152, Newton, Massachusetts, sep. 27-28, 2001.
Akash Kumar Mandal received his B.E degree in Electronics and Telecommunication from Pt. Ravi Shankar Shukla University, Raipur, in 2007 and pursuing his post graduation from Swami Vivekananda Technical University, Bhilai in Communication Engineering. His areas of interest Information Security and Cryptography. He is a member of Indian Society for Technical Education (ISTE) and The Institution of Electronics and Telecommunication Engineers (IETE). Prof. Archana Tiwari received her B.E degree in Electronics and Telecommunication from Amravati in 1994 and completed her post graduation from GEC Jabalpur in 2005. She is pursuing her PhD from Swami Vivekananda Technical University, Bhilai. She has to her credit, more than 20 papers in various International and National Journals and Conferences. With more than 16 years of teaching and research experience .She is currently serving as Associate professor & head in the department of Electronics and Instrumentation, Chhatrapati Shivaji Institute of Technology, Durg. Her areas of interest include image processing, information security and digital watermarking. She is a life member of Indian Society for Technical Education (ISTE) and Institution of Electronics and Telecommunications Engineers (IETE).. She is member of IEEE also.
Page 171